An algebraic framework for Diffie–Hellman assumptions
We put forward a new algebraic framework to generalize and analyze Diffie–Hellman like
decisional assumptions which allows us to argue about security and applications by …
decisional assumptions which allows us to argue about security and applications by …
Public key encryption with conjunctive keyword search and its extension to a multi-user system
YH Hwang, PJ Lee - International conference on pairing-based …, 2007 - Springer
We study the problem of a public key encryption with conjunctive keyword search (PECK).
The keyword searchable encryption enables a user to outsource his data to the storage of …
The keyword searchable encryption enables a user to outsource his data to the storage of …
Structure-preserving signatures and commitments to group elements
M Abe, G Fuchsbauer, J Groth, K Haralambiev… - Advances in Cryptology …, 2010 - Springer
A modular approach for cryptographic protocols leads to a simple design but often inefficient
constructions. On the other hand, ad hoc constructions may yield efficient protocols at the …
constructions. On the other hand, ad hoc constructions may yield efficient protocols at the …
Simulation-sound NIZK proofs for a practical language and constant size group signatures
J Groth - Advances in Cryptology–ASIACRYPT 2006: 12th …, 2006 - Springer
Non-interactive zero-knowledge proofs play an essential role in many cryptographic
protocols. We suggest several NIZK proof systems based on prime order groups with a …
protocols. We suggest several NIZK proof systems based on prime order groups with a …
Unidirectional chosen-ciphertext secure proxy re-encryption
B Libert, D Vergnaud - Public Key Cryptography–PKC 2008: 11th …, 2008 - Springer
Abstract In 1998, Blaze, Bleumer, and Strauss proposed a cryptographic primitive called
proxy re-encryption, in which a proxy transforms–without seeing the corresponding plaintext …
proxy re-encryption, in which a proxy transforms–without seeing the corresponding plaintext …
Secure hybrid encryption from weakened key encapsulation
D Hofheinz, E Kiltz - Annual International Cryptology Conference, 2007 - Springer
We put forward a new paradigm for building hybrid encryption schemes from constrained
chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus …
chosen-ciphertext secure (CCCA) key-encapsulation mechanisms (KEMs) plus …
Anonymous broadcast encryption: Adaptive security and efficient constructions in the standard model
In this paper we consider anonymity in the context of Broadcast Encryption (BE). This issue
has received very little attention so far and all but one of the currently available BE schemes …
has received very little attention so far and all but one of the currently available BE schemes …
Fully anonymous group signatures without random oracles
J Groth - Advances in Cryptology–ASIACRYPT 2007: 13th …, 2007 - Springer
We construct a new group signature scheme using bilinear groups. The group signature
scheme is practical, both keys and group signatures consist of a constant number of group …
scheme is practical, both keys and group signatures consist of a constant number of group …
Tightly CCA-secure encryption without pairings
We present the first CCA-secure public-key encryption scheme based on DDH where the
security loss is independent of the number of challenge ciphertexts and the number of …
security loss is independent of the number of challenge ciphertexts and the number of …
Group signatures with almost-for-free revocation
Group signatures are a central cryptographic primitive where users can anonymously and
accountably sign messages in the name of a group they belong to. Several efficient …
accountably sign messages in the name of a group they belong to. Several efficient …